Search results

1 – 10 of over 20000
Article
Publication date: 1 March 1999

K.H. Spencer Pickett

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the…

40043

Abstract

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the main themes ‐ a discussion between Bill and Jack on tour in the islands ‐ forms the debate. Explores the concepts of control, necessary procedures, fraud and corruption, supporting systems, creativity and chaos, and building a corporate control facility.

Details

Management Decision, vol. 37 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 June 1998

K.H. Spencer Pickett

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the…

38406

Abstract

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the main themes ‐ a discussion between Bill and Jack on tour in the islands ‐ forms the debate. Explores the concepts of control, necessary procedures, fraud and corruption, supporting systems, creativity and chaos, and building a corporate control facility.

Details

Managerial Auditing Journal, vol. 13 no. 4/5
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 14 November 2016

Stefan Fenz, Stefanie Plieschnegger and Heidi Hobel

The purpose of this paper is to increase the degree of automation within information security compliance projects by introducing a formal representation of the ISO 27002 standard…

1511

Abstract

Purpose

The purpose of this paper is to increase the degree of automation within information security compliance projects by introducing a formal representation of the ISO 27002 standard. As information is becoming more valuable and the current businesses face frequent attacks on their infrastructure, enterprises need support at protecting their information-based assets.

Design/methodology/approach

Information security standards and guidelines provide baseline knowledge for protecting corporate assets. However, the efforts to check whether the implemented measures of an organization adhere to the proposed standards and guidelines are still significantly high.

Findings

This paper shows how the process of compliance checking can be supported by using machine-readable ISO 27002 control descriptions in combination with a formal representation of the organization’s assets.

Originality/value

The authors created a formal representation of the ISO 27002 standard and showed how a security ontology can be used to increase the efficiency of the compliance checking process.

Details

Information & Computer Security, vol. 24 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 January 1998

KRISHNAN GOWRI and SEBASTIANO DEPANNI

In order to ensure the health and safety of occupants, buildings must be inspected to check their compliance to current regulatory requirements prompted by occupancy changes…

Abstract

In order to ensure the health and safety of occupants, buildings must be inspected to check their compliance to current regulatory requirements prompted by occupancy changes, renovations and building code revisions. Recent inspections conducted by Public Works Canada have identified about 1700 occurrences of code violations in 19 buildings. There is an enormous amount of information that can be extracted from the study mentioned above to implement a knowledge‐based expert system to assist in future building inspections. The philosophy of this expert system is to integrate both knowledge‐based and hypertext representation techniques to enable building inspectors to quickly identify code violations, refer to the code text and provide case study information that can assist in resolving a problem. The present paper describes the development framework and details of a prototype implementation known as the Health and Safety Expert System (HASES). The HASES currently addresses the requirements of ‘Section 3.4: Requirements for Exits’ of the 1990 National Building Code of Canada. The software architecture consists of an external database of building details, an object hierarchy and a rule‐base representing the code requirements, hypertext user‐interface for code text and case study information. The ultimate objective is to make this system available for field inspections using notepad computers.

Details

Engineering, Construction and Architectural Management, vol. 5 no. 1
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 11 April 2016

Tanja Kamin and Daša Kokole

Alcohol availability is strongly related to excessive alcohol consumption. This study aims to examine social marketing’s response to concerns about retailers’ noncompliance with…

Abstract

Purpose

Alcohol availability is strongly related to excessive alcohol consumption. This study aims to examine social marketing’s response to concerns about retailers’ noncompliance with the minimum legal drinking age (MLDA) law by proposing and evaluating a social marketing intervention directed at sellers in off-premise stores.

Design/methodology/approach

The study is based on a non-randomized quasi-experimental design, focusing on an evaluation of the implementation of the “18 rules!” intervention in four cities in Slovenia. Two waves of underage purchase attempts were conducted pre- and post-intervention in 24 off-premise businesses, following a mystery shopping protocol.

Findings

The initial rate of retailers’ noncompliance with the MLDA law in off-premise establishments was high. After the social marketing intervention, an increase with compliance with the law was observed; the proportion of cashiers selling alcohol to minors after the intervention decreased from 96 to 67 per cent. Qualitative insight suggests an existence of retailers’ dilemma in complying with the MLDA.

Research limitations/implications

A social marketing approach could contribute to a better understanding of the social working of the MLDA law.

Practical implications

A social marketing approach could complement the usual enforcement strategies and contribute to a better understanding of the social working of the MLDA law, and encourage deliberate retailers’ compliance with it while developing valuable exchanges among people and stakeholders.

Originality/value

The paper conceptualizes retailers’ dilemma in complying with the minimal legal drinking age law and offers social marketing response to it. Results of the study show that also solely non-coercive measures have the potential in increasing retailers’ compliance with regulations.

Details

Journal of Social Marketing, vol. 6 no. 2
Type: Research Article
ISSN: 2042-6763

Keywords

Article
Publication date: 8 October 2018

Majed Alshammari and Andrew Simpson

Concerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers…

Abstract

Purpose

Concerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers are increasingly expected to develop and maintain privacy-aware systems that both comply with such frameworks and standards and meet reasonable expectations of privacy. This paper aims to facilitate reasoning about privacy compliance, from legal frameworks and standards, with a view to providing necessary technical assurances.

Design/methodology/approach

The authors show how the standard extension mechanisms of the UML meta-model might be used to specify and represent data-processing activities in a way that is amenable to privacy compliance checking and assurance.

Findings

The authors demonstrate the usefulness and applicability of the extension mechanisms in specifying key aspects of privacy principles as assumptions and requirements, as well as in providing criteria for the evaluation of these aspects to assess whether the model meets these requirements.

Originality/value

First, the authors show how key aspects of abstract privacy principles can be modelled using stereotypes and tagged values as privacy assumptions and requirements. Second, the authors show how compliance with these principles can be assured via constraints that establish rules for the evaluation of these requirements.

Details

Information & Computer Security, vol. 26 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 June 2016

Frank Hadasch, Alexander Maedche and Shirley Gregor

In organizations, individual user’s compliance with business processes is important from a regulatory and efficiency point of view. The restriction of users’ choices by…

Abstract

Purpose

In organizations, individual user’s compliance with business processes is important from a regulatory and efficiency point of view. The restriction of users’ choices by implementing a restrictive information system is a typical approach in many organizations. However, restrictions and mandated compliance may affect employees’ performance negatively. Especially when users need a certain degree of flexibility in completing their work activity. The purpose of this paper is to introduce the concept of directive explanations (DEs). DEs provide context-dependent feedback to users, but do not force users to comply.

Design/methodology/approach

The experimental study used in this paper aims at investigating how DEs influence users’ process compliance. The authors used a laboratory experiment to test the proposed hypotheses. Every participant underwent four trials for which business process compliance was measured. Two trial blocks were used to cluster the four trials. Diagrammatic DEs were provided in one of the trial blocks, while textual DEs were provided in the other. Trial blocks were counterbalanced.

Findings

The results of the experiment show that DEs influence a user’s compliance, but the effect varies for different types of DEs. The authors believe this study is significant as it empirically examines design characteristics of explanations from knowledge-based systems in the context of business processes.

Research limitations/implications

This study is certainly not without limitations. The sample used for this study was drawn from undergraduate information systems management students. The sample is thus not representative of the general population of organizations’ IT users. However, a student sample adequately represents novice IT users, who are not very familiar with a business process. They are particularly suitable to study how users react to first-time contact with a DE.

Practical implications

The findings of this study are important to designers and implementers of systems that guide users to follow business processes. As the authors have illustrated with a real-world scenario, an ERP system’s explanation can lack details on how a user can resolve a blocked activity. In situations in which users bypass restricted systems, DEs can guide them to comply with a business process. Particularly diagrammatic explanations, which depict actors, activities, and constraints for a business process, have been found to increase the probability that users’ behavior is business process compliant. Less time may be needed to resolve a situation, which can result in very efficient user-system cooperation.

Originality/value

This study makes several important contributions to research on explanations, which are provided by knowledge-based systems. First, the authors conceptualized, designed, and investigated a novel type of explanations, namely, DEs. The results of this study show how dramatic the difference in process compliance performance is when exposed to certain types of DEs (in one group from 57 percent on the initial trial to 82 percent on the fourth trial). This insight is important to derive design guidelines for DE, particularly when multimedia material is used.

Details

Business Process Management Journal, vol. 22 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 23 August 2021

Fuad Abujarad, Allissa Desloge, Kristina Carlson and Sarah J. Swierenga

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper aims to describe how an efficient and effective…

Abstract

Purpose

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper aims to describe how an efficient and effective childcare Workforce Background Check system was developed and implemented to protect both children and childcare staff in the state of Michigan.

Design/methodology/approach

The user-centered design (UCD) approach was used in the creation and statewide implementation of a new acceptable and usable system, the Michigan childcare background check (CCBC) system. The authors conducted focus groups to obtain user feedback and performed several usability evaluations. This approach was used as guidance for the development process and to evaluate the concept designs for the web application that was created.

Findings

This paper discusses the overall process of implementing the CCBC program, focusing on successes, barriers and lessons learned in the planning, designing and execution phases. By May 2019, more than 92,069 background checks were conducted on personnel in 8,740 licensed childcare facilities across Michigan. Collaboration across stakeholders in different sectors facilitated the implementation of the new system, while structural barriers and stigma provided barriers to implementation.

Practical implications

Having individuals with various roles, abilities and technical expertise assist with the development and implementation of the system ensured the usability and acceptability of the new system by all types of users.

Social implications

The general public expects childcare providers to ensure that their employees meet the highest professional standards. Developing effective, easy-to-use fingerprint-based criminal history background check systems to identify ineligible applicants and monitor current employees is one component of an overall strategy to promote child safety and minimize child abuse and neglect in the childcare environments.

Originality/value

This paper provides a practical example of how a CCBC system can be developed, implemented and scaled to be used statewide. This approach can be used by other states or other disciplines with a similar context.

Plain language summary

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper shows how this study uses the UCD approach to create an acceptable and usable system and complete statewide implementation of a new Michigan CCBC program. This resulted in an efficient and effective Workforce Background Check system that is essential to protect both children and childcare staff.

Details

Journal of Systems and Information Technology, vol. 23 no. 3/4
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 17 October 2019

Junaid Haseeb, Naveed Ahmad, Saif U.R. Malik and Adeel Anjum

Business process (BP) reengineering is defined as reinventing BPs either structurally or technically to achieve dramatic improvements in performance. In any business process…

1126

Abstract

Purpose

Business process (BP) reengineering is defined as reinventing BPs either structurally or technically to achieve dramatic improvements in performance. In any business process reengineering (BPR) project, process modeling is used to reason about problems found in existing (as-is) process and helps to design target (to-be) process. BP model notation is a widely accepted standard for process modeling. “Expressiveness” and “missing formal semantics” are two problems reported to its modeling practices. In existing studies, solutions to these problems are also proposed but still have certain limitations. The paper aims to discuss this issue.

Design/methodology/approach

In proposed methodology, a meta-model is formally defined that is composed of commonly used modeling elements and their well-formedness rules to check for syntactic and structural correctness of process models. Proposed solution also check semantics of process models and allows to compare as-is and to-be process models for gap identification which is another important aspect of BPR. To achieve the first goal, Z specification is used to provide formal specifications of modeling constructs and their rules and Z3 (an SMT solver) is used for comparisons and verifying properties.

Findings

Proposed method addresses both “expressiveness” and “missing formal semantics” of BPR models. The results of its evaluation clearly indicate that using formally specified meta-model, BPR model is syntactically and structurally correct. Moreover, formal modeling of BPs in Z3 helped to compare processes and to check control flow properties.

Research limitations/implications

Although the proposed method is tested on an example that is widely used in BPR literature, the example is only covering modeling elements which are part of the proposed subset and are reported in literature as frequently used modeling elements. A separate detailed study is required to test it on more complex systems.

Practical implications

Specifying process models using Z specification and Z3 solver requires certain expertise.

Originality/value

The proposed method adds value to BPR body of knowledge as it proposes a method to ensure structural and syntactic correctness of models, highlighting the importance of verifying run time properties and providing a direction toward comparing process models for gap analysis.

Details

Business Process Management Journal, vol. 26 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 20000